US20090094689A1 - Authentication method and system - Google Patents
Authentication method and system Download PDFInfo
- Publication number
- US20090094689A1 US20090094689A1 US12/245,971 US24597108A US2009094689A1 US 20090094689 A1 US20090094689 A1 US 20090094689A1 US 24597108 A US24597108 A US 24597108A US 2009094689 A1 US2009094689 A1 US 2009094689A1
- Authority
- US
- United States
- Prior art keywords
- codebook
- extraction pattern
- authentication
- symbols
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Definitions
- the present invention relates to an authentication method and system, and more particularly to a two factor authentication system based on the generation of a low cost code book.
- the number of interactions that an individual may carry out via an electronic interface is continually increasing.
- Automatic Teller Machines are now ubiquitous, and with the spread of the Internet, services such as online commerce, Internet banking, credit card and other bill payments, personalized websites including webmail sites, and even tax declaration are increasingly common.
- services such as online commerce, Internet banking, credit card and other bill payments, personalized websites including webmail sites, and even tax declaration are increasingly common.
- the usual means for carrying out this authentication is by submitting a PIN code, password or other piece of secret data, which is known by the service and the user alone.
- each such piece of information should be unique to the service in question, and that it should be as large and random as possible, to minimize the risk of the discovery of one secret prejudicing the security of multiple systems, and the probability of a third-party guessing the secret.
- each piece of secret information should be replaced frequently to maintain high security standards. It is also highly undesirable that a user should write down or otherwise record such secrets in an unprotected manner.
- a tension thus arises between the need for a user to remember a large number of large pieces of random data, and the propensity of most individuals to choose the simplest option, such as choosing a well known and easy to remember set of passwords and using them in a cyclic way for all their services. This behaviour enormously reduces the security of protected resources.
- a codebook comprising a number of groups of symbols in a predetermined pattern, is issued to a user.
- the user is attributed or selects an extraction pattern representing an order of progression through the symbols in each group of symbols.
- an authentication party which also has knowledge of the content of the codebook and the extraction pattern challenges the user to submit the symbols found at selected positions in the extraction pattern.
- the user applies the extraction pattern to the codebook and retrieves the symbols found at the selected positions, and submits these to the authenticating party.
- the authenticating party applies the same extraction pattern to the same codebook, and determines whether the results match those submitted by the user, and in a case where the two sets of symbols match, authenticates the user.
- the method of the present invention may also be employed using an authenticating computer system and a codebook.
- the computer system can receive requests for authentication across a network, poll the requesting parties for data strings based upon extraction of information from requested reference sequences and extraction patterns from the codebook, and, if a comparison of the information received from the requesting party matches the expected result, the requesting party may be authenticated to access a program on the authenticating computer system or to access another computer across the network.
- FIG. 1 is a flow diagram view of a first embodiment of the present invention
- FIG. 2 is a flow diagram view of a second embodiment of the present invention.
- FIG. 3 is a flow diagram view of a third embodiment of the present invention.
- FIG. 4 is a view of an exemplary configuration of a reference sequence
- FIG. 5 is an illustration of a codebook on a physical support according to an embodiment
- FIG. 6 displays the application of the extraction of the present invention to a physical support of FIG. 5 ;
- FIG. 7 illustrates an exemplary extraction pattern of the present invention
- FIG. 8 further illustrates use of an extraction pattern with the present invention
- FIG. 9 shows the physical support of FIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity;
- FIG. 10 is a screenshot of an interface for the activation step of the present invention.
- FIG. 11 is a block diagram of a computer system suitable for implementing the present invention.
- a user seeking authentication to access a secure network or other electronic service initiates authentication by using a device, such as a mobile telephone, PDA, personal computer, automated teller machine terminal, to poll an authenticating party. This may be done by the use of a conventional login, by entering a user name, or otherwise providing user information to the network in a convention low-security manner.
- the user receives notification from the authenticating party identifying an extraction pattern position for a selected reference sequence from a codebook comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier 106 .
- the user references the code book to apply the extraction pattern to specific positions in sequence to extract a second predetermined number of symbols to said selected reference sequence so as to extract requested symbols at the extraction pattern position identified by said identifier 107 .
- the user then returns the extracted symbol or symbols are to the authenticating party 108 .
- the extracted request symbol or symbols are returned so that the authenticating party may apply the extraction pattern to each respective selected reference sequence to a matching local copy of the codebook so as to extract one or more authentication symbols 1081 , and the authentication symbols received by the authenticating party from the user are then compared to the corresponding request symbols 1082 . If, in each respective authentication symbol matches the corresponding request symbol 1083 , the authenticating party authenticates the user 1084 .
- FIG. 2 a flow chart for an alternative embodiment of the invention is shown and will be described. More particularly, in addition to steps 106 to 108 as described in FIG. 1 and again incorporated within this embodiment, FIG. 2 further illustrates a prior step of defining a codebook 201 , and further defining extraction patterns 202 by referencing the codebook. Unlike other secure methods that require a time chip, a USB key or another electronic device, a codebook may consist of printed matter, such as a reference card. The codebook and the extraction pattern are provided to both an authenticating party and a requesting party 203 .
- the extraction pattern and the codebook may be defined at the user device, or at the authenticating party, or by collaboration between these two parties, or either or both may still further be provided by one or more third parties. Both the authenticating party and the user device must share knowledge of the extraction pattern and the codebook.
- the codebook may be randomly or pseudorandomly generated.
- the extraction pattern may be selected by the user for example from a standard set of possible patterns.
- the extraction pattern may alternatively be any arbitrary pattern as selected by the authenticating party or the user or randomly or pseudorandomly determined.
- An underlying assumption of the present authenticating method is that the codebook and the extraction pattern are known only to the two parties, and to no other party. Knowledge of either the codebook or the extraction pattern alone by a third party does not prejudice the security of the method however.
- the data may be sent as an encrypted electronic signal, or may be sent by some alternative parallel channel such as by conventional mail, facsimile message, telephone message, or other communication methods known in the art.
- FIG. 3 a flow chart for a second alternative embodiment of the invention is shown and will be described.
- This embodiment incorporates the steps of the prior two embodiments described above, but includes additional intermediate steps. Namely, after the codebook 201 and extraction pattern 202 are defined and the codebook is provided to the authenticating and requesting parties 203 , the method of FIG. 3 comprises the further steps of the authenticating party selecting at least one of the plurality of reference sequences 304 , and then notifying the unique identifier thereof to the requesting party 305 . Thus from a codebook containing a plurality of reference sequences, a subset of the available reference sequences may be selected for any given authentication.
- the selected reference sequences may be chosen in a manner which is random, pseudorandom or otherwise unpredictable to external parties.
- the reference sequences for use in authentication may be preselected by the user or the authenticating party either for a particular authentication situation, or for all authentications.
- the reference sequences may be redefined as necessary.
- the method of the present invention consists of the steps of defining a codebook 201 comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier.
- An extraction pattern 202 is identified, and the codebook is providing the codebook to a requesting party 203 . It is noted that the extraction pattern may be identified by the authenticating party, selected by the requesting party or otherwise created by collaboration between the authenticating party and the requesting party.
- the codebook may be provided 203 in physical or electronic form, and, if provided in electronic form, may be printed by the requesting party or stored in a memory for later retrieval and on-screen viewing on a computer, PDA, cell phone, or another electronic device including a screen as known in the art.
- the authenticating party waits to receive a request from a requesting party for authentication to start the authentication sequence.
- the authenticating party responds to the authentication request by specifying at least one selected reference sequence 304 and notifying the requesting party of the unique identifier of the reference sequence 305 .
- the reference sequence may be preselected prior to receiving a request from the requesting party and queued awaiting a request, or selected when a request is received.
- the requesting party receives the information identifying the reference sequence, and then acts upon the received information of the reference sequence 106 and unique identifier by applying the extraction pattern 107 , and returning the code extracted 108 .
- This reception and return of information can be done across a network using any network device, such as a computer, a telephone, a PDA or other electronic communications device, or the present invention could also be employed on a single computer.
- the authenticating party then compares the sequence of data returned from said requesting party based on the extracted symbols determined from said reference sequence using the extraction pattern position with an expected sequence based upon the previously determined reference sequence in the codebook 1082 , then, if the comparison of returned data matches the expected sequence 1083 , authenticates the requesting party 1084 .
- the authenticating party may be a remote authenticator, allowing the requesting party to access another site or program on the network, or may reside on the same computer as the program to which the requesting party seeks authentication.
- the codebook is embodied as physical printed matter.
- This physical support may be, for example, a piece of sheet material, such as paper, card, plastic or similar material, upon which are printed the first plurality of reference sequences, each comprising the second plurality of symbols and a respective unique identifier.
- the unique identifier need not be explicitly provided, but may be implicitly provided in the form of the position of the reference sequence on the physical support, e.g. by means of the identifier “top left” and so on.
- One obvious special case is the situation where only one reference sequence is provided, where the identifier is simply, “the only reference sequence provided”.
- the reference sequence comprises a rectangle 401 containing nine identical smaller rectangles in a 3 by 3 matrix.
- the central one of these nine smaller rectangles 402 contains a symbol service as a unique identifier for the reference sequence in question.
- the unique identifier is a number 1 .
- the remaining eight smaller rectangles 4011 , 4012 , 4013 , 4014 , 4015 , 4016 , 4017 and 4018 are arranged around the central rectangle 402 .
- Each of these peripheral rectangles contains an authentication symbol, which as shown consist in each case of a pair of alphanumeric characters.
- any symbol or user identifiable characteristic may be used as an authentication symbol, for example, characters of any alphabet, pictograms or images, colours, patterns and so on.
- the limiting considerations are simply that the user must be able to distinguish one from another, and submit the same to the authenticating party. In some cases this may call for the use of an existing interface wherein alphanumeric or even purely numeric input is necessary.
- FIG. 5 shows a codebook on a physical support according to an embodiment.
- a physical support 500 bearing eight reference sequences 501 , 502 , 503 , 504 , 505 , 506 , 507 and 508 , having the unique identifiers 1 , 2 , 3 , 4 , 5 , 6 and 7 respectively.
- These eight reference sequences are each laid out is the same manner as that described with respect to FIG. 4 . It will be noted that the authentication symbols provided in each reference sequence are different from one sequence to the next, and that there is no discernable pattern in the authentication symbols.
- FIG. 6 shows the application of the third embodiment to the physical support of FIG. 5 .
- one or more reference sequences are selected from the available plurality, and the selected reference sequences are notified to the user by means of the unique identifier of each selected reference sequence.
- the first, third, fourth and seventh reference sequences were selected for a particular authentication operation.
- the authenticating party notifies the user with the unique identifiers “ 1 ”, “ 3 ”, “ 4 ” and “ 7 ”, on the basis of the physical support shown in FIG. 5 .
- the user may then disregard the reference symbols 502 , 505 , 506 and 508 . Accordingly, as shown in FIG.
- reference sequences 501 , 503 , 504 and 507 are retained. In some embodiments, this obscuring of the reference sequences not required for a particular authentication is only notional. In other embodiments, some or all reference sequences may be obscured by, for example, a foil or other removable layer, with only the sequences requested by the authenticating party being laid bare.
- FIG. 7 shows a reference sequence as a 3 by 3 matrix, although the authentication symbols are omitted for the same of clarity.
- An arrow 700 indicating a path through the eight peripheral smaller rectangles describes a spiraling path starting at the top left outer rectangle and proceeding clockwise about the center. This spiral represents the sequence in which one would count through the various symbols in order to arrive at a particular selected extraction pattern position. For example, if the third extraction pattern position was requested, the symbol retrieved would be that located in the top right hand rectangle. If the eighth extraction pattern position was requested, the symbol retrieved would be that located in the left hand column on the second row, and so on.
- FIG. 8 shows the extension of the extraction pattern previously described extended to larger numbers.
- the extraction pattern position number may be greater than the number of symbols present. In such cases, the extraction pattern may be applied in a repetitive manner until the position number is attained.
- extraction pattern positions 1 to 8 are arrived at by a simple application of the extraction pattern to the matrix, as shown in the leftmost matrix 801 .
- the pattern simply starts again at the first position, and so on as shown in the central matrix 802 , similar to a modulo operation.
- the present invention implements a two-factor authentication mechanism, because it is based on something the user owns, namely the codebook, and something the user knows (the extraction pattern to decode authentication questions using the card).
- the extraction pattern to decode authentication questions using the card.
- One skilled in the art will appreciate that a very wide range of extraction patterns may be envisioned. Even in the case of the simple matrix described in the forgoing embodiments a very large number of permutations are possible, including spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters and myriads of other patterns.
- Different extraction patterns may be applied for different reference sequences. The number of positions defined in an extraction pattern before it starts repeating itself may not be equal to the number of positions in the reference sequence, so that each iteration starts from a different point.
- a different series of steps may be described for subsequent iterations. For example, while for positions 1 to 8 a clockwise circulation though the various positions is described, for positions 9 to 17 a reverse in direction may be called for as shown in element 803 . Again, any number of variations may conceived.
- the number of positions prior to a change in pattern need not be an integral multiple of the number of positions.
- the pattern may be entirely arbitrary, although, for ease of the use, it is preferable that the pattern should correspond to some easily memorable pattern such as a sequence of spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters.
- FIG. 9 shows the physical support of FIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity.
- FIG. 9 shows the physical support of FIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity.
- Positions 1 , 2 , 7 and 5 are derived from the secret key the user knows and that has been communicated to the authentication service at the time of card activation.
- User applies his key code according to a known (to the user and to the authentication system) mapping strategy. The key code is applied always in the same way, regardless of the reference sequences asked by the authentication system. For instance, if the key code is exactly 1275 and the mapping strategy is the clockwise spiral represented in FIG.
- the authenticating party may optionally be a central authentication service which provides authentication for a number of different services.
- the central authentication may define and distribute codebooks, and issue notifications. All communications may pass through service providers making use of this centralised authentication system.
- Such a centralized authentication service may act as a hub of user profile data; this allows service providers to just define which information is relevant for them, and it can be extracted from existing profiles, thereby minimizing data entry from the end user of multiple services.
- Service providers may also agree with the authenticating party about quality and strength of authentication (SLA), such as the minimum length of authentication answers, size and lifetime of codebooks, entropy of authentication answers, and other security parameters.
- SLA quality and strength of authentication
- Centralization of user profile data is also valuable for end users since they can immediately know the services to which they are subscribed, and may easily update profile information to all subscribed services or revoke or suspend one or all user subscriptions with just one click.
- the authenticating party may generate authentication questions with a limited lifetime, which are equivalent to one time passwords. In such cases if the delay between step 1 - 6 and step 1081 exceeds a predetermined delay, authentication may be automatically refused, and the process may optionally return to step 106 , with new reference sequences and extraction pattern positions being requested.
- a user seeks access to a particular service provider, which may optionally forward the user to the authenticating party.
- the user is then able to register with the authenticating party providing basic profile information, and choosing a username and a temporary password.
- the authenticating party generates a codebook according to the SLA with the service provider and binds it to the service of the provider as requested by the user.
- a codebook is delivered to the user, using a method known in the art such as sending a download link to the user e-mail address for downloading and printing, or delivering a codebook via a physical courier.
- a conventional computer graphical user interface window such as a web browser 1000 , comprising a text box 1001 for the entry of the selected reference sequences, a button or similar interface feature 1002 to initiate the automatic selection of reference sequences and a set of “radio buttons” or the like associated with a set of predefined extraction patterns from which a user may select.
- Changing the extraction pattern is the easiest way to modify the authentication answer to a same authentication question; a user will always remember the same reference sequences and will just apply a different mapping strategy of the code on his/her card, thereby reading the card in a different manner.
- An authenticating party can use the same authentication mechanism offered to service providers; after a user activates a codebook, he can choose to use it also to logon to the authenticating party; no additional password is required: the user will just remember the reference sequences and own the appropriate extraction pattern.
- FIG. 11 depicts a computer system suitable for implementing the present invention.
- Computer system 1100 may correspond to the user device described above and comprises a processor 1110 , a main memory 1120 , a mass storage interface 1130 , a display interface 1140 , and a network interface 1150 . These system components are interconnected through the use of a system bus 1101 .
- Mass storage interface 1130 is used to connect mass storage devices (Hard disk drive 1155 ) to computer system 1100 .
- One specific type of removable storage interface drive 1162 is a floppy disk drive which may store data to and read data from a floppy disk 1195 , but other types of computer readable storage medium may be employed, such as readable and optionally writable CD-ROM drive.
- Main memory 1120 in accordance with the preferred embodiments contains data 1122 , an operating system 1124 .
- Computer system 1100 utilizes well known virtual addressing mechanisms that allow the programs of computer system 1100 to behave as if they only have access to a large, single storage entity instead of access to multiple, smaller storage entities such as main memory 1120 and HDD 1155 .
- main memory 1120 main memory 1120
- data 1122 represents any data that serves as input to or output from any program in computer system 1100 .
- Operating system 1124 is a multitasking computer operating system; those skilled in the art will appreciate that the spirit and scope of the present invention is not limited to any one operating system.
- Processor 1110 may be constructed from one or more microprocessors and/or integrated circuits. Processor 1110 executes program instructions stored in main memory 1120 .
- Main memory 1120 stores programs and data that processor 1110 may access.
- processor 1110 When computer system 1100 starts up, processor 1110 initially executes the program instructions that make up operating system 1124 .
- Operating system 1124 is a sophisticated program that manages the resources of computer system 1100 . Some of these resources are processor 1110 , main memory 1120 , mass storage interface 1130 , display interface 1140 , network interface 1150 , and system bus 1101 .
- computer system 1100 is shown to contain only a single processor and a single system bus, those skilled in the art will appreciate that the present invention may be practiced using a computer system that has multiple processors and/or multiple buses.
- Display interface 1140 is used to directly connect one or more displays 1160 to computer system 1100 .
- These displays 1160 which may be non-intelligent (i.e., dumb) terminals or fully programmable workstations, are used to allow system administrators and users to communicate with computer system 1100 .
- Network interface 1150 is used to connect other computer systems and/or workstations (e.g., 1175 in FIG. 11 ) to computer system 1100 across a network 1170 .
- the present invention applies equally no matter how computer system 1100 may be connected to other computer systems and/or workstations, regardless of whether the network connection 1170 is made using present-day analogue and/or digital techniques or via some networking mechanism of the future.
- many different network protocols can be used to implement a network. These protocols are specialized computer programs that allow computers to communicate across network 1170 .
- TCP/IP Transmission Control Protocol/Internet Protocol
- the network 1170 connects the system 1100 to two further devices 1171 and 1172 , which may be other computer systems similar to that described above, or other network capable devices such as printers, routers etc.
- network device 1172 is a local server, which is connected via a modem 1181 to a public network 1180 such as the World Wide Web.
- a connection to a remote device or system 1185 may be established.
- the role of the authenticating party as described above may be implemented by a local network computer 1170 , a local server 1172 or a remote system or device 1185 , depending on the implementation of the invention selected.
- the invention in the form of software running on conventional hardware as described above with regard to FIG. 11 , or an embodiment containing both hardware and software elements.
- the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode and other forms of implementation known in the art.
- the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
- a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
- Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
- a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
- the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
- I/O devices including but not limited to keyboards, displays, pointing devices, etc.
- I/O controllers can be coupled to the system either directly or through intervening I/O controllers.
- Network adapters may also be coupled to the system to enable the data processing system to communicate with other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- The present invention relates to an authentication method and system, and more particularly to a two factor authentication system based on the generation of a low cost code book. The number of interactions that an individual may carry out via an electronic interface is continually increasing. Automatic Teller Machines are now ubiquitous, and with the spread of the Internet, services such as online commerce, Internet banking, credit card and other bill payments, personalized websites including webmail sites, and even tax declaration are increasingly common. In virtually all cases it is necessary for a user to identify himself to the system at some stage, and furthermore to authenticate this identity. The usual means for carrying out this authentication is by submitting a PIN code, password or other piece of secret data, which is known by the service and the user alone. With the multiplication of such services, an individual is required to maintain and remember an increasingly large number of such pieces of secret information. Furthermore, as a general rule it is desirable that each such piece of information should be unique to the service in question, and that it should be as large and random as possible, to minimize the risk of the discovery of one secret prejudicing the security of multiple systems, and the probability of a third-party guessing the secret. Ideally each piece of secret information should be replaced frequently to maintain high security standards. It is also highly undesirable that a user should write down or otherwise record such secrets in an unprotected manner. A tension thus arises between the need for a user to remember a large number of large pieces of random data, and the propensity of most individuals to choose the simplest option, such as choosing a well known and easy to remember set of passwords and using them in a cyclic way for all their services. This behaviour enormously reduces the security of protected resources.
- According to the present invention, a codebook, comprising a number of groups of symbols in a predetermined pattern, is issued to a user. The user is attributed or selects an extraction pattern representing an order of progression through the symbols in each group of symbols. When the user wishes to make an authentication action an authentication party which also has knowledge of the content of the codebook and the extraction pattern challenges the user to submit the symbols found at selected positions in the extraction pattern. The user applies the extraction pattern to the codebook and retrieves the symbols found at the selected positions, and submits these to the authenticating party. The authenticating party applies the same extraction pattern to the same codebook, and determines whether the results match those submitted by the user, and in a case where the two sets of symbols match, authenticates the user.
- The method of the present invention may also be employed using an authenticating computer system and a codebook. The computer system can receive requests for authentication across a network, poll the requesting parties for data strings based upon extraction of information from requested reference sequences and extraction patterns from the codebook, and, if a comparison of the information received from the requesting party matches the expected result, the requesting party may be authenticated to access a program on the authenticating computer system or to access another computer across the network.
-
FIG. 1 is a flow diagram view of a first embodiment of the present invention; -
FIG. 2 is a flow diagram view of a second embodiment of the present invention; -
FIG. 3 is a flow diagram view of a third embodiment of the present invention; -
FIG. 4 is a view of an exemplary configuration of a reference sequence; -
FIG. 5 is an illustration of a codebook on a physical support according to an embodiment; -
FIG. 6 displays the application of the extraction of the present invention to a physical support ofFIG. 5 ; -
FIG. 7 illustrates an exemplary extraction pattern of the present invention; -
FIG. 8 further illustrates use of an extraction pattern with the present invention; -
FIG. 9 shows the physical support ofFIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity; -
FIG. 10 is a screenshot of an interface for the activation step of the present invention; and -
FIG. 11 is a block diagram of a computer system suitable for implementing the present invention. - Referring now to
FIG. 1 , a flow chart of a first embodiment of the invention is shown and will be described. A user seeking authentication to access a secure network or other electronic service initiates authentication by using a device, such as a mobile telephone, PDA, personal computer, automated teller machine terminal, to poll an authenticating party. This may be done by the use of a conventional login, by entering a user name, or otherwise providing user information to the network in a convention low-security manner. The user then receives notification from the authenticating party identifying an extraction pattern position for a selected reference sequence from a codebook comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and aunique identifier 106. Next, in response to said notification, the user references the code book to apply the extraction pattern to specific positions in sequence to extract a second predetermined number of symbols to said selected reference sequence so as to extract requested symbols at the extraction pattern position identified by saididentifier 107. The user then returns the extracted symbol or symbols are to theauthenticating party 108. The extracted request symbol or symbols are returned so that the authenticating party may apply the extraction pattern to each respective selected reference sequence to a matching local copy of the codebook so as to extract one ormore authentication symbols 1081, and the authentication symbols received by the authenticating party from the user are then compared to thecorresponding request symbols 1082. If, in each respective authentication symbol matches thecorresponding request symbol 1083, the authenticating party authenticates theuser 1084. - Referring now to
FIG. 2 , a flow chart for an alternative embodiment of the invention is shown and will be described. More particularly, in addition tosteps 106 to 108 as described inFIG. 1 and again incorporated within this embodiment,FIG. 2 further illustrates a prior step of defining acodebook 201, and further definingextraction patterns 202 by referencing the codebook. Unlike other secure methods that require a time chip, a USB key or another electronic device, a codebook may consist of printed matter, such as a reference card. The codebook and the extraction pattern are provided to both an authenticating party and a requestingparty 203. The extraction pattern and the codebook may be defined at the user device, or at the authenticating party, or by collaboration between these two parties, or either or both may still further be provided by one or more third parties. Both the authenticating party and the user device must share knowledge of the extraction pattern and the codebook. The codebook may be randomly or pseudorandomly generated. The extraction pattern may be selected by the user for example from a standard set of possible patterns. The extraction pattern may alternatively be any arbitrary pattern as selected by the authenticating party or the user or randomly or pseudorandomly determined. An underlying assumption of the present authenticating method is that the codebook and the extraction pattern are known only to the two parties, and to no other party. Knowledge of either the codebook or the extraction pattern alone by a third party does not prejudice the security of the method however. It is therefore desirable to provide the codebook and the extraction pattern to theparties 203 via a secure method. The data may be sent as an encrypted electronic signal, or may be sent by some alternative parallel channel such as by conventional mail, facsimile message, telephone message, or other communication methods known in the art. - Referring now to
FIG. 3 , a flow chart for a second alternative embodiment of the invention is shown and will be described. This embodiment incorporates the steps of the prior two embodiments described above, but includes additional intermediate steps. Namely, after thecodebook 201 andextraction pattern 202 are defined and the codebook is provided to the authenticating and requestingparties 203, the method ofFIG. 3 comprises the further steps of the authenticating party selecting at least one of the plurality ofreference sequences 304, and then notifying the unique identifier thereof to the requestingparty 305. Thus from a codebook containing a plurality of reference sequences, a subset of the available reference sequences may be selected for any given authentication. The selected reference sequences may be chosen in a manner which is random, pseudorandom or otherwise unpredictable to external parties. The reference sequences for use in authentication may be preselected by the user or the authenticating party either for a particular authentication situation, or for all authentications. The reference sequences may be redefined as necessary. The steps of receivingnotification 106, applying theextraction pattern 107, returning the extractedsymbol 108 and verifying 1083, along with all other steps, as initially described in the discussion ofFIG. 1 , remain the same throughout all embodiments of the invention. - Reviewing
FIG. 3 and the previous figures, the method of the present invention consists of the steps of defining acodebook 201 comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier. Anextraction pattern 202 is identified, and the codebook is providing the codebook to a requestingparty 203. It is noted that the extraction pattern may be identified by the authenticating party, selected by the requesting party or otherwise created by collaboration between the authenticating party and the requesting party. It is further noted that the codebook may be provided 203 in physical or electronic form, and, if provided in electronic form, may be printed by the requesting party or stored in a memory for later retrieval and on-screen viewing on a computer, PDA, cell phone, or another electronic device including a screen as known in the art. Next, the authenticating party waits to receive a request from a requesting party for authentication to start the authentication sequence. The authenticating party responds to the authentication request by specifying at least one selectedreference sequence 304 and notifying the requesting party of the unique identifier of thereference sequence 305. It is noted that the reference sequence may be preselected prior to receiving a request from the requesting party and queued awaiting a request, or selected when a request is received. The requesting party receives the information identifying the reference sequence, and then acts upon the received information of thereference sequence 106 and unique identifier by applying theextraction pattern 107, and returning the code extracted 108. This reception and return of information can be done across a network using any network device, such as a computer, a telephone, a PDA or other electronic communications device, or the present invention could also be employed on a single computer. The authenticating party then compares the sequence of data returned from said requesting party based on the extracted symbols determined from said reference sequence using the extraction pattern position with an expected sequence based upon the previously determined reference sequence in thecodebook 1082, then, if the comparison of returned data matches the expectedsequence 1083, authenticates the requestingparty 1084. The authenticating party may be a remote authenticator, allowing the requesting party to access another site or program on the network, or may reside on the same computer as the program to which the requesting party seeks authentication. - Turning now to
FIG. 4 , an exemplary configuration of a reference sequence is illustrated. In the current embodiment of the invention, the codebook is embodied as physical printed matter. This physical support may be, for example, a piece of sheet material, such as paper, card, plastic or similar material, upon which are printed the first plurality of reference sequences, each comprising the second plurality of symbols and a respective unique identifier. It will be understood that the unique identifier need not be explicitly provided, but may be implicitly provided in the form of the position of the reference sequence on the physical support, e.g. by means of the identifier “top left” and so on. One obvious special case is the situation where only one reference sequence is provided, where the identifier is simply, “the only reference sequence provided”. Other unique identifiers my take the form of the colour, shape or configuration of the reference sequence. As shown by the token illustrated, the reference sequence comprises arectangle 401 containing nine identical smaller rectangles in a 3 by 3 matrix. The central one of these ninesmaller rectangles 402 contains a symbol service as a unique identifier for the reference sequence in question. As shown here, the unique identifier is anumber 1. The remaining eightsmaller rectangles central rectangle 402. Each of these peripheral rectangles contains an authentication symbol, which as shown consist in each case of a pair of alphanumeric characters. Naturally, any symbol or user identifiable characteristic may be used as an authentication symbol, for example, characters of any alphabet, pictograms or images, colours, patterns and so on. The limiting considerations are simply that the user must be able to distinguish one from another, and submit the same to the authenticating party. In some cases this may call for the use of an existing interface wherein alphanumeric or even purely numeric input is necessary. -
FIG. 5 shows a codebook on a physical support according to an embodiment. As shown inFIG. 5 there is provided aphysical support 500 bearing eightreference sequences unique identifiers FIG. 4 . It will be noted that the authentication symbols provided in each reference sequence are different from one sequence to the next, and that there is no discernable pattern in the authentication symbols. -
FIG. 6 shows the application of the third embodiment to the physical support ofFIG. 5 . In accordance with the third embodiment of the invention as described above, atstep 305 one or more reference sequences are selected from the available plurality, and the selected reference sequences are notified to the user by means of the unique identifier of each selected reference sequence. In this example, the first, third, fourth and seventh reference sequences were selected for a particular authentication operation. Subsequently, the authenticating party notifies the user with the unique identifiers “1”, “3”, “4” and “7”, on the basis of the physical support shown inFIG. 5 . The user may then disregard thereference symbols FIG. 6 , only the remainingreference sequences - Turning now to
FIG. 7 , an exemplary extraction pattern is shown. As described above, it is necessary to apply an extraction pattern to the selected reference sequence or sequences.FIG. 7 shows a reference sequence as a 3 by 3 matrix, although the authentication symbols are omitted for the same of clarity. Anarrow 700 indicating a path through the eight peripheral smaller rectangles describes a spiraling path starting at the top left outer rectangle and proceeding clockwise about the center. This spiral represents the sequence in which one would count through the various symbols in order to arrive at a particular selected extraction pattern position. For example, if the third extraction pattern position was requested, the symbol retrieved would be that located in the top right hand rectangle. If the eighth extraction pattern position was requested, the symbol retrieved would be that located in the left hand column on the second row, and so on. -
FIG. 8 shows the extension of the extraction pattern previously described extended to larger numbers. The extraction pattern position number may be greater than the number of symbols present. In such cases, the extraction pattern may be applied in a repetitive manner until the position number is attained. As previously described with respect toFIG. 7 , extraction pattern positions 1 to 8 are arrived at by a simple application of the extraction pattern to the matrix, as shown in theleftmost matrix 801. When a ninth extraction pattern position is called for, the pattern simply starts again at the first position, and so on as shown in thecentral matrix 802, similar to a modulo operation. - As described, the present invention implements a two-factor authentication mechanism, because it is based on something the user owns, namely the codebook, and something the user knows (the extraction pattern to decode authentication questions using the card). One skilled in the art will appreciate that a very wide range of extraction patterns may be envisioned. Even in the case of the simple matrix described in the forgoing embodiments a very large number of permutations are possible, including spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters and myriads of other patterns. Different extraction patterns may be applied for different reference sequences. The number of positions defined in an extraction pattern before it starts repeating itself may not be equal to the number of positions in the reference sequence, so that each iteration starts from a different point. Still further, rather than simply repeating the pattern as previously described for position numbers greater than positions given, a different series of steps may be described for subsequent iterations. For example, while for
positions 1 to 8 a clockwise circulation though the various positions is described, forpositions 9 to 17 a reverse in direction may be called for as shown inelement 803. Again, any number of variations may conceived. The number of positions prior to a change in pattern need not be an integral multiple of the number of positions. The pattern may be entirely arbitrary, although, for ease of the use, it is preferable that the pattern should correspond to some easily memorable pattern such as a sequence of spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters. With a simple reference sequence selection of 6 digits and a {8,8,2} codebook, that is, a codebook with 8 reference sequences, 8 authentication symbols per reference sequence and 2 characters per authentication symbol, it is possible to generate to 8̂6=262, 144 different authentication questions and provide as many answers composed by 6*2=12 symbols. - Turning now to
FIG. 9 , one can appreciate that by applying the given extraction pattern to selected reference sequences as described with respect toFIG. 6 , it is possible to extract a series of authentication symbols. Continuing the prior examples, and using a clockwise extraction pattern starting at the upper left corner illustrated inFIG. 7 , suppose thatreference sequences positions FIG. 9 shows the physical support ofFIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity. Thus as shown by applying the sequence ofFIG. 7 to the reference sequence numbered 1, and selecting the first position in the pattern, we select the symbol “SD” in the top left rectangle of the top left reference sequence. Next as shown by applying the sequence ofFIG. 7 to the reference sequence numbered 4, and selecting the second position in the pattern, we select the symbol “JP” in the top centre rectangle of the third reference sequence in the top row. Next as shown by applying the sequence ofFIG. 7 to the reference sequence numbered 4, and selecting the seventh position in the pattern, we select the symbol “V4” in the bottom left rectangle of the rightmost reference sequence in the top row. Finally as shown by applying the sequence ofFIG. 7 to the reference sequence numbered 7, and selecting the fifth position in the pattern, we select the symbol “T3” in the bottom right rectangle of the third reference sequence in the top row. When thus applying the selection process at the user site, the extracted symbols “SD,JP,V4,T3” can then be transmitted to the authenticating party. By applying the same process at the authenticating party, the same symbols can be derived, and compared to those received for the user, and in a case where the two sets of symbols are found to match, the authenticating party can authenticate the user, as described above.Positions FIG. 7 , when the system asks forreference sequences FIG. 5 , the extracted symbols will be: L2-L5-D7-58; again, if the system asks forreference sequence - In the present invention, the authenticating party may optionally be a central authentication service which provides authentication for a number of different services. The central authentication may define and distribute codebooks, and issue notifications. All communications may pass through service providers making use of this centralised authentication system. Such a centralized authentication service may act as a hub of user profile data; this allows service providers to just define which information is relevant for them, and it can be extracted from existing profiles, thereby minimizing data entry from the end user of multiple services. Service providers may also agree with the authenticating party about quality and strength of authentication (SLA), such as the minimum length of authentication answers, size and lifetime of codebooks, entropy of authentication answers, and other security parameters. Centralization of user profile data is also valuable for end users since they can immediately know the services to which they are subscribed, and may easily update profile information to all subscribed services or revoke or suspend one or all user subscriptions with just one click. The authenticating party may generate authentication questions with a limited lifetime, which are equivalent to one time passwords. In such cases if the delay between step 1-6 and
step 1081 exceeds a predetermined delay, authentication may be automatically refused, and the process may optionally return to step 106, with new reference sequences and extraction pattern positions being requested. - Turning now to
FIG. 10 , an optional implementation of the present invention is illustrated and will be described. Initially, a user seeks access to a particular service provider, which may optionally forward the user to the authenticating party. The user is then able to register with the authenticating party providing basic profile information, and choosing a username and a temporary password. The authenticating party generates a codebook according to the SLA with the service provider and binds it to the service of the provider as requested by the user. A codebook is delivered to the user, using a method known in the art such as sending a download link to the user e-mail address for downloading and printing, or delivering a codebook via a physical courier. After receiving the codebook, the user must activate it, communicating to the authenticating party the preselected reference sequences and the extraction pattern he will use. The preselected reference sequences and/or the extraction pattern can be changed at any time during the codebook lifetime. For example, a conventional computer graphical user interface window such as aweb browser 1000, comprising atext box 1001 for the entry of the selected reference sequences, a button orsimilar interface feature 1002 to initiate the automatic selection of reference sequences and a set of “radio buttons” or the like associated with a set of predefined extraction patterns from which a user may select. Changing the extraction pattern is the easiest way to modify the authentication answer to a same authentication question; a user will always remember the same reference sequences and will just apply a different mapping strategy of the code on his/her card, thereby reading the card in a different manner. An authenticating party can use the same authentication mechanism offered to service providers; after a user activates a codebook, he can choose to use it also to logon to the authenticating party; no additional password is required: the user will just remember the reference sequences and own the appropriate extraction pattern. Given the extremely low cost and ease of generation of the physical support for the codebook, users may own multiple codebooks, one for each type of services; generally, this is not possible with other two-factor authentication systems currently known in the art, because almost all of them rely on hardware devices, which are much more expensive than a physical support such as a printed card as previously described. -
FIG. 11 depicts a computer system suitable for implementing the present invention.Computer system 1100 may correspond to the user device described above and comprises aprocessor 1110, amain memory 1120, amass storage interface 1130, adisplay interface 1140, and anetwork interface 1150. These system components are interconnected through the use of asystem bus 1101.Mass storage interface 1130 is used to connect mass storage devices (Hard disk drive 1155) tocomputer system 1100. One specific type of removablestorage interface drive 1162 is a floppy disk drive which may store data to and read data from afloppy disk 1195, but other types of computer readable storage medium may be employed, such as readable and optionally writable CD-ROM drive. There is similarly provided auser input interface 1144 which received user interactions from interface devices such as amouse 1165 and akeyboard 1164. There is still further provided aprinter interface 1146 which may send and optionally receive signals to and from aprinter 1166.Main memory 1120 in accordance with the preferred embodiments containsdata 1122, anoperating system 1124.Computer system 1100 utilizes well known virtual addressing mechanisms that allow the programs ofcomputer system 1100 to behave as if they only have access to a large, single storage entity instead of access to multiple, smaller storage entities such asmain memory 1120 andHDD 1155. Therefore, whiledata 1122,operating system 1124, are shown to reside inmain memory 1120, those skilled in the art will recognize that these items are not necessarily all completely contained inmain memory 1120 at the same time. It should also be noted that the term “memory” is used herein to generically refer to the entire virtual memory ofcomputer system 1100.Data 1122 represents any data that serves as input to or output from any program incomputer system 1100.Operating system 1124 is a multitasking computer operating system; those skilled in the art will appreciate that the spirit and scope of the present invention is not limited to any one operating system.Processor 1110 may be constructed from one or more microprocessors and/or integrated circuits.Processor 1110 executes program instructions stored inmain memory 1120.Main memory 1120 stores programs and data thatprocessor 1110 may access. Whencomputer system 1100 starts up,processor 1110 initially executes the program instructions that make upoperating system 1124.Operating system 1124 is a sophisticated program that manages the resources ofcomputer system 1100. Some of these resources areprocessor 1110,main memory 1120,mass storage interface 1130,display interface 1140,network interface 1150, andsystem bus 1101. Althoughcomputer system 1100 is shown to contain only a single processor and a single system bus, those skilled in the art will appreciate that the present invention may be practiced using a computer system that has multiple processors and/or multiple buses. In addition, the interfaces that are used in the preferred embodiment each include separate, fully programmed microprocessors that are used to off-load compute-intensive processing fromprocessor 1110. However, those skilled in the art will appreciate that the present invention applies equally to computer systems that simply use I/O adapters to perform similar functions.Display interface 1140 is used to directly connect one ormore displays 1160 tocomputer system 1100. Thesedisplays 1160, which may be non-intelligent (i.e., dumb) terminals or fully programmable workstations, are used to allow system administrators and users to communicate withcomputer system 1100. Note, however, that whiledisplay interface 1140 is provided to support communication with one ormore displays 1160,computer system 1100 does not necessarily require adisplay 1165, because all needed interaction with users and other processes may occur vianetwork interface 1150.Network interface 1150 is used to connect other computer systems and/or workstations (e.g., 1175 inFIG. 11 ) tocomputer system 1100 across anetwork 1170. The present invention applies equally no matter howcomputer system 1100 may be connected to other computer systems and/or workstations, regardless of whether thenetwork connection 1170 is made using present-day analogue and/or digital techniques or via some networking mechanism of the future. In addition, many different network protocols can be used to implement a network. These protocols are specialized computer programs that allow computers to communicate acrossnetwork 1170. TCP/IP (Transmission Control Protocol/Internet Protocol) is an example of a suitable network protocol, for example over an Ethernet network. As shown, thenetwork 1170 connects thesystem 1100 to twofurther devices network device 1172 is a local server, which is connected via amodem 1181 to apublic network 1180 such as the World Wide Web. By means of this public network 1180 a connection to a remote device orsystem 1185 may be established. The role of the authenticating party as described above may be implemented by alocal network computer 1170, alocal server 1172 or a remote system ordevice 1185, depending on the implementation of the invention selected. - It is important to note that while the present invention has been and will continue to be described in the context of a fully functional computer system, those skilled in the art will appreciate that the present invention is capable of being distributed as a program product in a variety of forms, and that the present invention applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of suitable signal bearing media include: recordable type media such as floppy disks and
CD ROM 1195, and transmission type media such as digital and analogue communications links. The invention can take the form of an entirely hardware embodiment, with recourse to suitably specified FPGAs, ASICs, CPLDs, dedicated integrated circuits and circuits formed of discrete components or any combination of all of these, an entirely software embodiment e.g. in the form of software running on conventional hardware as described above with regard toFIG. 11 , or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode and other forms of implementation known in the art. Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD. A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable the data processing system to communicate with other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
Claims (11)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07117917.0 | 2007-10-04 | ||
EP07117917 | 2007-10-04 | ||
EP07117917 | 2007-10-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090094689A1 true US20090094689A1 (en) | 2009-04-09 |
US9275214B2 US9275214B2 (en) | 2016-03-01 |
Family
ID=40352193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/245,971 Expired - Fee Related US9275214B2 (en) | 2007-10-04 | 2008-10-06 | Authentication method and system |
Country Status (2)
Country | Link |
---|---|
US (1) | US9275214B2 (en) |
WO (1) | WO2009043661A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110277021A1 (en) * | 2009-01-09 | 2011-11-10 | Hideharu Ogawa | Authentication system |
US20130139248A1 (en) * | 2011-11-28 | 2013-05-30 | Samsung Electronics Co., Ltd. | Method of authenticating password and portable device thereof |
US20160359866A1 (en) * | 2015-06-05 | 2016-12-08 | Fisher-Rosemount Systems, Inc. | Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity |
US20180365409A1 (en) * | 2017-06-19 | 2018-12-20 | Kyocera Document Solutions Inc. | Service providing system, card set used in service providing system, and method for providing service |
US11388596B2 (en) * | 2019-09-03 | 2022-07-12 | International Business Machines Corporation | Secure transmittal of wireless local area network access codes |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10235532B2 (en) * | 2016-09-23 | 2019-03-19 | Harman International Industries, Incorporated | Device access control |
US11580210B2 (en) * | 2021-02-18 | 2023-02-14 | International Business Machines Corporation | Password authentication |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5559961A (en) * | 1994-04-04 | 1996-09-24 | Lucent Technologies Inc. | Graphical password |
US20020029341A1 (en) * | 1999-02-11 | 2002-03-07 | Ari Juels | Robust visual passwords |
WO2002073377A2 (en) * | 2001-03-14 | 2002-09-19 | Jaloveczki Laszlo | Authorisation method for a user of a limited access system having an authorisation centre |
US20040111646A1 (en) * | 2002-12-10 | 2004-06-10 | International Business Machines Corporation | Password that associates screen position information with sequentially entered characters |
US20040123151A1 (en) * | 2002-12-23 | 2004-06-24 | Authenture, Inc. | Operation modes for user authentication system based on random partial pattern recognition |
US20040243855A1 (en) * | 2001-11-28 | 2004-12-02 | Bouygues Telecom, A Corporation Of France | Method for providing secure access to a digital resource |
US6862687B1 (en) * | 1997-10-23 | 2005-03-01 | Casio Computer Co., Ltd. | Checking device and recording medium for checking the identification of an operator |
US20050060554A1 (en) * | 2003-08-29 | 2005-03-17 | Nokia Corporation | Method and device for customized picture-based user identification and authentication |
US6934860B1 (en) * | 2000-05-08 | 2005-08-23 | Xerox Corporation | System, method and article of manufacture for knowledge-based password protection of computers and other systems |
US20060031174A1 (en) * | 2004-07-20 | 2006-02-09 | Scribocel, Inc. | Method of authentication and indentification for computerized and networked systems |
US20070016941A1 (en) * | 2005-07-08 | 2007-01-18 | Gonzalez Carlos J | Methods used in a mass storage device with automated credentials loading |
US20070016804A1 (en) * | 2005-07-13 | 2007-01-18 | Kemshall Andrew C | Password management system |
US20070028299A1 (en) * | 2005-07-26 | 2007-02-01 | Gherardo Albano | Client-based method, system and program to manage multiple authentication |
US20080195976A1 (en) * | 2007-02-14 | 2008-08-14 | Cho Kyung-Suk | Method of setting password and method of authenticating password in portable device having small number of operation buttons |
US20080295165A1 (en) * | 2004-03-31 | 2008-11-27 | Merlinnovations & Consulting Gmbh | Method for Safely Logging Onto a Technical System |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7644433B2 (en) * | 2002-12-23 | 2010-01-05 | Authernative, Inc. | Authentication system and method based upon random partial pattern recognition |
CN101278186A (en) | 2005-10-03 | 2008-10-01 | 皇家飞利浦电子股份有限公司 | Biosensors with improved sensitivity |
GB2433147A (en) * | 2005-12-01 | 2007-06-13 | Jonathan Geoffrey Milt Craymer | A method for verifying a person's identity or entitlement using one-time transaction codes |
-
2008
- 2008-09-02 WO PCT/EP2008/061521 patent/WO2009043661A1/en active Application Filing
- 2008-10-06 US US12/245,971 patent/US9275214B2/en not_active Expired - Fee Related
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5559961A (en) * | 1994-04-04 | 1996-09-24 | Lucent Technologies Inc. | Graphical password |
US6862687B1 (en) * | 1997-10-23 | 2005-03-01 | Casio Computer Co., Ltd. | Checking device and recording medium for checking the identification of an operator |
US20020029341A1 (en) * | 1999-02-11 | 2002-03-07 | Ari Juels | Robust visual passwords |
US6934860B1 (en) * | 2000-05-08 | 2005-08-23 | Xerox Corporation | System, method and article of manufacture for knowledge-based password protection of computers and other systems |
WO2002073377A2 (en) * | 2001-03-14 | 2002-09-19 | Jaloveczki Laszlo | Authorisation method for a user of a limited access system having an authorisation centre |
US20040243855A1 (en) * | 2001-11-28 | 2004-12-02 | Bouygues Telecom, A Corporation Of France | Method for providing secure access to a digital resource |
US20040111646A1 (en) * | 2002-12-10 | 2004-06-10 | International Business Machines Corporation | Password that associates screen position information with sequentially entered characters |
US20040123151A1 (en) * | 2002-12-23 | 2004-06-24 | Authenture, Inc. | Operation modes for user authentication system based on random partial pattern recognition |
US20050060554A1 (en) * | 2003-08-29 | 2005-03-17 | Nokia Corporation | Method and device for customized picture-based user identification and authentication |
US20080295165A1 (en) * | 2004-03-31 | 2008-11-27 | Merlinnovations & Consulting Gmbh | Method for Safely Logging Onto a Technical System |
US20060031174A1 (en) * | 2004-07-20 | 2006-02-09 | Scribocel, Inc. | Method of authentication and indentification for computerized and networked systems |
US20070016941A1 (en) * | 2005-07-08 | 2007-01-18 | Gonzalez Carlos J | Methods used in a mass storage device with automated credentials loading |
US20070016804A1 (en) * | 2005-07-13 | 2007-01-18 | Kemshall Andrew C | Password management system |
US20070028299A1 (en) * | 2005-07-26 | 2007-02-01 | Gherardo Albano | Client-based method, system and program to manage multiple authentication |
US20080195976A1 (en) * | 2007-02-14 | 2008-08-14 | Cho Kyung-Suk | Method of setting password and method of authenticating password in portable device having small number of operation buttons |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110277021A1 (en) * | 2009-01-09 | 2011-11-10 | Hideharu Ogawa | Authentication system |
US8959603B2 (en) * | 2009-01-09 | 2015-02-17 | Hideharu Ogawa | Authentication system |
US20130139248A1 (en) * | 2011-11-28 | 2013-05-30 | Samsung Electronics Co., Ltd. | Method of authenticating password and portable device thereof |
US9165132B2 (en) * | 2011-11-28 | 2015-10-20 | Samsung Electronics Co., Ltd. | Method of authenticating password and portable device thereof |
US20160359866A1 (en) * | 2015-06-05 | 2016-12-08 | Fisher-Rosemount Systems, Inc. | Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity |
CN106249704A (en) * | 2015-06-05 | 2016-12-21 | 费希尔-罗斯蒙特系统公司 | For the method and apparatus controlling the communication of the end points in industrial undertaking's system based on integrity |
US10051059B2 (en) * | 2015-06-05 | 2018-08-14 | Fisher-Rosemount Systems, Inc. | Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity |
US20180365409A1 (en) * | 2017-06-19 | 2018-12-20 | Kyocera Document Solutions Inc. | Service providing system, card set used in service providing system, and method for providing service |
US11388596B2 (en) * | 2019-09-03 | 2022-07-12 | International Business Machines Corporation | Secure transmittal of wireless local area network access codes |
Also Published As
Publication number | Publication date |
---|---|
WO2009043661A1 (en) | 2009-04-09 |
US9275214B2 (en) | 2016-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12063208B2 (en) | Single sign-on for unmanaged mobile devices | |
US10057251B2 (en) | Provisioning account credentials via a trusted channel | |
US10009378B2 (en) | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques | |
US9524395B2 (en) | Apparatus and methods for obtaining a password hint | |
US9680836B2 (en) | Generation of a visually obfuscated representation of an alphanumeric message that indicates availability of a proposed identifier | |
US8966579B2 (en) | Method and apparatus for providing authentication between a sending unit and a recipient based on challenge usage data | |
JP4866432B2 (en) | General user self-certification and authentication system | |
US8756652B2 (en) | Automatic PIN creation using password | |
Boyd | Getting started with OAuth 2.0 | |
US10171448B2 (en) | Single sign-on for unmanaged mobile devices | |
US20100043062A1 (en) | Methods and Systems for Management of Image-Based Password Accounts | |
US9275214B2 (en) | Authentication method and system | |
CN113711211A (en) | First-factor contactless card authentication system and method | |
US20080052245A1 (en) | Advanced multi-factor authentication methods | |
US11689512B2 (en) | Access key retrieval service for clients | |
US10866711B1 (en) | Providing account information to applications | |
WO2008024362A9 (en) | Advanced multi-factor authentication methods | |
Srinivasa Ravi Kiran et al. | Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time Password | |
JP2007065789A (en) | Authentication system and method | |
KR20140087627A (en) | Certification system using security key of icon combination and method of using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GARGARO, GIANLUCA;TRINCHINI, PATRIZIO;REEL/FRAME:021646/0285 Effective date: 20081007 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Expired due to failure to pay maintenance fee |
Effective date: 20200301 |